FreeBSD : cups-filters -- buffer overflow in texttopdf size allocation (b19da422-1e02-11e5-b43d-002590263bf5)

High Nessus Plugin ID 84484


The remote FreeBSD host is missing a security-related update.


Stefan Cornelius from Red Hat reports :

A heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filters processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code.

Till Kamppeter reports :

texttopdf: Fixed buffer overflow on size allocation of texttopdf when working with extremely small line sizes, which causes the size calculation to result in 0 (CVE-2015-3258, thanks to Stefan Cornelius from Red Hat for the patch).


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 84484

File Name: freebsd_pkg_b19da4221e0211e5b43d002590263bf5.nasl

Version: $Revision: 2.2 $

Type: local

Published: 2015/07/01

Modified: 2015/07/15

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cups-filters, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/06/29

Vulnerability Publication Date: 2015/06/26

Reference Information

CVE: CVE-2015-3258